Computer Science, Dept. of
Browse by
The JHU Department of Computer Science is a department within the Whiting School of Engineering. While studies and research cover a very wide area, there are five main research interests:
Algorithms – A core area and long-standing strength of the department, dating from before the department’s formation.
Robotics, Vision, and Graphics – Much of the research in these areas, which involve 3-D computer modeling, is done within the Center for Computer-Integrated Surgical Systems and Technology (CISST). Related research includes human-computer interaction, and shape recognition and shape matching.
Security – This is an incredibly broad area and research, focused within the JHU Information Security Institute, involves many aspects of computer and network security.
Systems – This core research area grapples with improving operating systems and data storage and defining higher standards for security evaluation.
Natural Language Processing – This concerns enabling computers to work more effectively with human languages, identifying input strings and corresponding output, defining correlations between text and speech, form and content, syntax and translations. The Center for Language and Speech Processing (CLSP) is centrally involved with this work.
Please see http://www.cs.jhu.edu/ for more information
Collections in this community
-
Current Technical Reports
Current Technical Reports -
Historic Technical Reports
Historic Technical Reports
Recent Submissions
-
Periodic solutions of differential equations containing a parameter
(The Johns Hopkins University, 1953-12-18) -
On the role of first integrals in the perturbation of periodic solutions
(The Johns Hopkins University, 1955-04-01) -
Recent work on families of periodic solutions of differential equations
(The Johns Hopkins University, 1959-06-30) -
On local and global properties of convex sets and hypersurfaces
(The Johns Hopkins University, 1959-11) -
On a conjecture of Montgomery
(1957-06) -
Extensions of representations of lie groups II
(1957-08) -
On the fundamental group of a homogeneous space
(1957-06) -
Equivariant embeddings in euclidean space
(1957-03) -
Families of periodic solutions of systems having relatively invariant line integrals
(The Johns Hopkins University, 1954-06-20) -
On the perturbation of a periodic solution when the variational system has non-trivial periodic solutions
(The Johns Hopkins University, 1955-01-20) -
On existence in the large of solutions of hyperbolic partial differential equations
(The Johns Hopkins University, 1960-07) -
Classifying Network Protocol Implementation Versions: An OpenSSL Case Study
(2013-12-11)A new technique is presented for identifying the implementation version number of software that is used for Internet communications. While many programs may exchange version numbers, oftentimes only a small subset of them ... -
iSeeYou: Disabling the MacBook Webcam Indicator LED
(2013-12-11)The ubiquitous webcam indicator LED is an important privacy feature which provides a visual cue that the camera is turned on. We describe how to disable the LED on a class of Apple internal iSight webcams used in some ... -
Multi-Object Geodesic Active Contours (MOGAC): A Parallel Sparse-Field Algorithm for Image Segmentation
(2012-02-28)An important task for computer vision systems is to segment adjacent structures in images without producing gaps or overlaps. Multi-object Level Set Methods (MLSM) perform this task with the benefit of sub-pixel accuracy. ... -
Evaluation of Diagonal Confidence-Weighted Learning on the KDD Cup 1999 Dataset for Network Intrusion Detection Systems
(2011-02-03)In this study, I evaluate the performance of diagonal Confidence-Weighted (CW) online linear classification on the KDD Cup 1999 dataset for network intrusion detection systems (NIDS). This is a compatible relationship due ... -
Design and Implementation of Views: Isolated Perspectives of a File System
(2010-04-20)We present Views, a file system architecture that provides isolation between system components for the purposes of access control, regulatory compliance, and sandboxing. Views allows for discrete I/O entities, such as ... -
Pseudorandom Number Generators on Atmel AVR AT90USB1287 Microcontrollers
(2010-01-27)The purpose of this report is to provide exhaustive details of my Computer Security Architecture project this spring 2008 semester. Ultimately, the goal has been to prepare a document that an undergraduate student can ... -
Design and Implementation of Views: Isolated Perspectives of a File System for Regulatory Compliance
(2009-08-24)We present Views, a file system architecture designed to meet the role-based access control (RBAC) requirement of federal regulations, such as those in HIPAA. Views allows for discrete IO entities, such as users, groups or ...